<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T10:44:25.179950+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/9eb9cab3-fc2c-4542-ad73-904bf0d8249d/export</id>
    <title>9eb9cab3-fc2c-4542-ad73-904bf0d8249d</title>
    <updated>2026-05-14T10:44:25.311185+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "9eb9cab3-fc2c-4542-ad73-904bf0d8249d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49124", "type": "seen", "source": "https://bsky.app/profile/osanpo.bsky.social/post/3lru3lbdtfi2k", "content": "", "creation_timestamp": "2025-06-18T03:40:06.375867Z"}</content>
    <link href="https://db.gcve.eu/sighting/9eb9cab3-fc2c-4542-ad73-904bf0d8249d/export"/>
    <published>2025-06-18T03:40:06.375867+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/e36bdb7f-998c-4ca5-a278-15132cfd065c/export</id>
    <title>e36bdb7f-998c-4ca5-a278-15132cfd065c</title>
    <updated>2026-05-14T10:44:25.311096+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "e36bdb7f-998c-4ca5-a278-15132cfd065c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49125", "type": "seen", "source": "https://bsky.app/profile/osanpo.bsky.social/post/3lru3lbdtfi2k", "content": "", "creation_timestamp": "2025-06-18T03:40:06.473964Z"}</content>
    <link href="https://db.gcve.eu/sighting/e36bdb7f-998c-4ca5-a278-15132cfd065c/export"/>
    <published>2025-06-18T03:40:06.473964+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d73e1c3c-9920-4e55-8962-ffc25e0cd858/export</id>
    <title>d73e1c3c-9920-4e55-8962-ffc25e0cd858</title>
    <updated>2026-05-14T10:44:25.311015+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d73e1c3c-9920-4e55-8962-ffc25e0cd858", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49124", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lruc6xl6o22x", "content": "", "creation_timestamp": "2025-06-18T05:38:29.174770Z"}</content>
    <link href="https://db.gcve.eu/sighting/d73e1c3c-9920-4e55-8962-ffc25e0cd858/export"/>
    <published>2025-06-18T05:38:29.174770+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/031745b9-9b94-45e9-baf2-60426cf40fd6/export</id>
    <title>031745b9-9b94-45e9-baf2-60426cf40fd6</title>
    <updated>2026-05-14T10:44:25.310937+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "031745b9-9b94-45e9-baf2-60426cf40fd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49125", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lruc6xl6o22x", "content": "", "creation_timestamp": "2025-06-18T05:38:29.380795Z"}</content>
    <link href="https://db.gcve.eu/sighting/031745b9-9b94-45e9-baf2-60426cf40fd6/export"/>
    <published>2025-06-18T05:38:29.380795+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/faf022b9-b863-49e4-befc-66cb3e51025d/export</id>
    <title>faf022b9-b863-49e4-befc-66cb3e51025d</title>
    <updated>2026-05-14T10:44:25.310837+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "faf022b9-b863-49e4-befc-66cb3e51025d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49126", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/19235", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-49126\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L)\n\ud83d\udd39 Description: Visionatrix is an AI Media processing tool using ComfyUI. In versions 1.5.0 to before 2.5.1, the /docs/flows endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack allowing full takeover of the application and exfiltration of secrets stored in the application. The implementation uses the get_swagger_ui_html function from FastAPI. This function does not encode or sanitize its arguments before using them to generate the HTML for the swagger documentation page and is not intended to be used with user-controlled arguments. Any user of this application can be targeted with a one-click attack that can takeover their session and all the secrets that may be contained within it. This issue has been patched in version 2.5.1.\n\ud83d\udccf Published: 2025-06-23T17:18:51.857Z\n\ud83d\udccf Modified: 2025-06-23T17:39:29.542Z\n\ud83d\udd17 References:\n1. https://github.com/Visionatrix/Visionatrix/security/advisories/GHSA-w36r-9jvx-q48v\n2. https://github.com/Visionatrix/Visionatrix/commit/63aafe6e4d1bffe4bf69e73b6fdfc65c71a8f5b8", "creation_timestamp": "2025-06-23T17:45:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/faf022b9-b863-49e4-befc-66cb3e51025d/export"/>
    <published>2025-06-23T17:45:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a642d792-f746-468a-b35e-a94fdad9e390/export</id>
    <title>a642d792-f746-468a-b35e-a94fdad9e390</title>
    <updated>2026-05-14T10:44:25.310749+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a642d792-f746-468a-b35e-a94fdad9e390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49126", "type": "published-proof-of-concept", "source": "Telegram/llanlRrbf3s9Rf868KZ425GV5KlSiI6fIpB3qhtKPPXkg-A", "content": "", "creation_timestamp": "2025-06-23T18:30:40.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a642d792-f746-468a-b35e-a94fdad9e390/export"/>
    <published>2025-06-23T18:30:40+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/218f5548-987b-4d13-9884-00dfca6ab955/export</id>
    <title>218f5548-987b-4d13-9884-00dfca6ab955</title>
    <updated>2026-05-14T10:44:25.310658+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "218f5548-987b-4d13-9884-00dfca6ab955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49126", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsccxf3t4h2u", "content": "", "creation_timestamp": "2025-06-23T19:29:24.706649Z"}</content>
    <link href="https://db.gcve.eu/sighting/218f5548-987b-4d13-9884-00dfca6ab955/export"/>
    <published>2025-06-23T19:29:24.706649+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5f2c1efc-926f-4a5b-a9d3-577abe31b7b5/export</id>
    <title>5f2c1efc-926f-4a5b-a9d3-577abe31b7b5</title>
    <updated>2026-05-14T10:44:25.310568+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5f2c1efc-926f-4a5b-a9d3-577abe31b7b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49125", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ltq2f44up22o", "content": "", "creation_timestamp": "2025-07-11T23:58:30.341515Z"}</content>
    <link href="https://db.gcve.eu/sighting/5f2c1efc-926f-4a5b-a9d3-577abe31b7b5/export"/>
    <published>2025-07-11T23:58:30.341515+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a986ba0a-1f2c-4fc9-95bd-4b1ac5e499a0/export</id>
    <title>a986ba0a-1f2c-4fc9-95bd-4b1ac5e499a0</title>
    <updated>2026-05-14T10:44:25.310397+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a986ba0a-1f2c-4fc9-95bd-4b1ac5e499a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49127", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ltz5gpo37k2u", "content": "", "creation_timestamp": "2025-07-15T14:47:03.052806Z"}</content>
    <link href="https://db.gcve.eu/sighting/a986ba0a-1f2c-4fc9-95bd-4b1ac5e499a0/export"/>
    <published>2025-07-15T14:47:03.052806+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/225a4c19-dd5a-4a24-8d6f-baa641434a54/export</id>
    <title>225a4c19-dd5a-4a24-8d6f-baa641434a54</title>
    <updated>2026-05-14T10:44:25.307484+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "225a4c19-dd5a-4a24-8d6f-baa641434a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-49124", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/225a4c19-dd5a-4a24-8d6f-baa641434a54/export"/>
    <published>2026-04-02T17:00:00+00:00</published>
  </entry>
</feed>
